GMS-2023-528: HTML Injection in Keycloak Admin REST API
(updated )
The execute-actions-email
endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
References
Detect and mitigate GMS-2023-528 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →